Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
AI-First Supply Chain Management
Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply
Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
A relational database management system, based on the principles laid down in the book "Databases, Types, and The Relational Model: The Third Manifesto" by C. J. Date and Hugh Darwen.
AGTK is a suite of software components for building tools for annotating linguistic signals,
time-series data which documents any kind of linguistic behavior (e.g. audio, video).
The internal data structures are based on annotation graphs.
The Malete database core is the new basis of OpenIsis,
which has its roots in the UNESCO CDS/ISIS database.
Traditionaly used in libraries; now a general purpose highspeed database.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Framework for software component integration, interoperability and adoptability through a XML based vocabulary: Software Component Integration Mark-up Language (SCIML)
2tools is a set of online CMS maintenance tools: just one click to migrate to/from different CMS; safe configuration settings to upgrade your CMS; easy Data movement to/from DBMS, databases or tables; SQL, XML, XSLT, PHP technologies.
All tools are main
e4Graph is a C++ library and a Tcl binding providing persistent, reliable, cross-platform storage for graph like structures. Please visit http://e4graph.sourceforge.net for more info.
CAVOR is an engine for building apps that involve both graphic and text/numeric data. Primarily GIS is the initial focus, but consider also CAD, CASE, project management (eg PERT charts), and others. Built-in scripting, C API, also supports Tcl and Java.